Bug 56683 - firmware-nonfree: Multiple issues (5.0)
firmware-nonfree: Multiple issues (5.0)
Status: CLOSED FIXED
Product: UCS
Classification: Unclassified
Component: Security updates
UCS 5.0
All Linux
: P3 normal (vote)
: UCS 5.0-5-errata
Assigned To: Quality Assurance
Iván.Delgado
:
Depends on:
Blocks:
  Show dependency treegraph
 
Reported: 2023-10-02 07:58 CEST by Quality Assurance
Modified: 2023-10-04 17:06 CEST (History)
0 users

See Also:
What kind of report is it?: Security Issue
What type of bug is this?: ---
Who will be affected by this bug?: ---
How will those affected feel about the bug?: ---
User Pain:
Enterprise Customer affected?:
School Customer affected?:
ISV affected?:
Waiting Support:
Flags outvoted (downgraded) after PO Review:
Ticket number:
Bug group (optional):
Max CVSS v3 score: 8.2 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H)


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Quality Assurance univentionstaff 2023-10-02 07:58:38 CEST
New Debian firmware-nonfree 20190114+really20220913-0+deb10u2 fixes:
This update addresses the following issues:
20190114+really20220913-0+deb10u2 (Sat, 30 Sep 2023 17:53:21 +0200)
[ Ben Hutchings ]
* Clean up backport to buster: - Revert "Update to linux-support 5.19.0-1" -  Use linux-support 5.10.0-0.deb10.23 - d/rules, d/watch: Make orig target  and uscan work with +really versions - qcom-media: Use lintian-overrides  from qcom-soc
* d/copyright: Add information about files re-added under debian/config
* Make CI work for buster: - d/salsa-ci.yml: Set RELEASE to buster -  d/salsa-ci.yml: Set changelog suite to UNRELEASED to avoid lintian error -  d/salsa-ci.yml: Run extract-source job in target release, not unstable
[ Tobias Frost ]
* Use linux-support 5.10.0-0.deb10.24
* Import changed firmware files from Intel for CVE-2022-27635 - Potential  privilege escalation vector CVE-2022-36351 - Potential denial of service  via adjacent access CVE-2022-38076 - Potential privilege escalation vector  CVE-2022-40964 - Potential privilege escalation vector CVE-2022-46329 -  Potential privilege escalation vector Details see Intel Advisory  INTEL-SA-00766 - Intel Bluetooth AX2xx series: intel/ibt-0041-0041.sfi  intel/ibt-19-0-0.sfi intel/ibt-19-0-1.sfi intel/ibt-19-0-4.sfi  intel/ibt-19-16-4.sfi intel/ibt-19-240-1.sfi intel/ibt-19-240-4.sfi  intel/ibt-19-32-0.sfi intel/ibt-19-32-1.sfi intel/ibt-19-32-4.sfi  intel/ibt-20-0-3.sfi intel/ibt-20-1-3.sfi intel/ibt-20-1-4.sfi - Intel  Wireless 22000 series iwlwifi-Qu-b0-hr-b0-77.ucode  iwlwifi-Qu-b0-jf-b0-77.ucode iwlwifi-Qu-c0-hr-b0-77.ucode  iwlwifi-Qu-c0-jf-b0-77.ucode iwlwifi-QuZ-a0-hr-b0-77.ucode  iwlwifi-cc-a0-77.ucode The updated firmware files might need an updated  kernel.
Comment 1 Quality Assurance univentionstaff 2023-10-02 08:01:05 CEST
--- mirror/ftp/pool/main/f/firmware-nonfree/firmware-nonfree_20190114+really20220913-0+deb10u1.dsc
+++ apt/ucs_5.0-0-errata5.0-5/source/firmware-nonfree_20190114+really20220913-0+deb10u2.dsc
@@ -1,3 +1,49 @@
+20190114+really20220913-0+deb10u2 [Sat, 30 Sep 2023 17:53:21 +0200] Tobias Frost <tobi@debian.org>:
+
+  [ Ben Hutchings ]
+  * Clean up backport to buster:
+    - Revert "Update to linux-support 5.19.0-1"
+    - Use linux-support 5.10.0-0.deb10.23
+    - d/rules, d/watch: Make orig target and uscan work with +really versions
+    - qcom-media: Use lintian-overrides from qcom-soc
+  * d/copyright: Add information about files re-added under debian/config
+  * Make CI work for buster:
+    - d/salsa-ci.yml: Set RELEASE to buster
+    - d/salsa-ci.yml: Set changelog suite to UNRELEASED to avoid lintian error
+    - d/salsa-ci.yml: Run extract-source job in target release, not unstable
+
+  [ Tobias Frost ]
+  * Use linux-support 5.10.0-0.deb10.24
+  * Import changed firmware files from Intel for
+    CVE-2022-27635 - Potential privilege escalation vector
+    CVE-2022-36351 - Potential denial of service via adjacent access
+    CVE-2022-38076 - Potential privilege escalation vector
+    CVE-2022-40964 - Potential privilege escalation vector
+    CVE-2022-46329 - Potential privilege escalation vector
+    Details see Intel Advisory INTEL-SA-00766
+    - Intel Bluetooth AX2xx series:
+      intel/ibt-0041-0041.sfi	
+      intel/ibt-19-0-0.sfi
+      intel/ibt-19-0-1.sfi
+      intel/ibt-19-0-4.sfi
+      intel/ibt-19-16-4.sfi
+      intel/ibt-19-240-1.sfi
+      intel/ibt-19-240-4.sfi
+      intel/ibt-19-32-0.sfi
+      intel/ibt-19-32-1.sfi
+      intel/ibt-19-32-4.sfi
+      intel/ibt-20-0-3.sfi
+      intel/ibt-20-1-3.sfi
+      intel/ibt-20-1-4.sfi
+    - Intel Wireless 22000 series
+      iwlwifi-Qu-b0-hr-b0-77.ucode
+      iwlwifi-Qu-b0-jf-b0-77.ucode
+      iwlwifi-Qu-c0-hr-b0-77.ucode
+      iwlwifi-Qu-c0-jf-b0-77.ucode
+      iwlwifi-QuZ-a0-hr-b0-77.ucode
+      iwlwifi-cc-a0-77.ucode
+    The updated firmware files might need an updated kernel.
+      
 20190114+really20220913-0+deb10u1 [Sat, 01 Apr 2023 16:52:19 +0200] Tobias Frost <tobi@debian.org>:
 
   * Non-maintainer upload by the LTS Security Team.

<http://piuparts.knut.univention.de/5.0-5/#7572765596801642066>
Comment 2 Iván.Delgado univentionstaff 2023-10-04 16:02:33 CEST
OK: bug
OK: yaml
OK: announce_errata
OK: patch
*OK: piuparts
  interactive for package

[5.0-5] 3489d43721b Bug #56683: firmware-nonfree 20190114+really20220913-0+deb10u2
 doc/errata/staging/firmware-nonfree.yaml | 42 ++++++++++++--------------------
 1 file changed, 15 insertions(+), 27 deletions(-)

[5.0-5] 9cb8057325e Bug #56683: firmware-nonfree 20190114+really20220913-0+deb10u2
 doc/errata/staging/firmware-nonfree.yaml | 42 ++++++++++++++++++++++++++++++++
 1 file changed, 42 insertions(+)
Comment 3 Iván.Delgado univentionstaff 2023-10-04 17:06:41 CEST
<https://errata.software-univention.de/#/?erratum=5.0x824>